search results matching tag: interception

» channel: learn

go advanced with your query
Search took 0.000 seconds

    Videos (81)     Sift Talk (4)     Blogs (4)     Comments (139)   

AVAILABLE NOW: Cruise Missles Concealed in Cargo Containers

burdturgler says...

>> ^Drachen_Jager:

...the United States NEEDS this kind of trickery ...


This is not a United States weapon, it's Russian.



^I love this propaganda from Russia Today calling it a "missile defense system". I don't see it intercepting any missiles in the demonstration.
I'm comforted though that they will only sell this to reliable end-users.

Ex-girlfriend hits Starcraft fan where it hurts

choggie says...

>> ^NordlichReiter:

Hmm, She went into his email?


§ 2701. Unlawful Access to Stored Communications
(a) Offense.--Except as provided in subsection (c) of this section whoever–
(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or
(2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.
(b) Punishment.--The punishment for an offense under subsection (a) of this section is–
(1) if the offense is committed for purposes of commercial advantage, malicious destruction or damage, or private commercial gain--
(A) a fine under this title or imprisonment for not more than one year, or both, in the case of a first offense under this subparagraph; and
(B) a fine under this title or imprisonment for not more than two years, or both, for any subsequent offense under this subparagraph; and
(2) a fine under this title or imprisonment for not more than six months, or both, in any other case.
(c) Exceptions.--Subsection (a) of this section does not apply with respect to conduct authorized–
(1) by the person or entity providing a wire or electronic communications service;
(2) by a user of that service with respect to a communication of or intended for that user; or
(3) in section 2703, 2704 or 2518 of this title.

She violated Federal Law, possibly much more.
§ 1343. Fraud by Wire, Radio, or Television
http://www.law.cornell.edu/uscode/18/1343.html
But more to the point, she intercepted communication which is the same as taking someones mail before they can read it.

18 U.S.C. § 2511(1)(a).
(1) Except as otherwise specifically provided in this chapter any person who—
(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication;

http://www.law.cornell.edu/uscode/18/1343.html
http://www.law.cornell.edu/uscode/18/usc_sec_18_00002511----000-.html

http://www.ibls.com/internet_law_news_portal_view.aspx?s=latest
news&id=2149

http://www.justice.gov/criminal/cybercrime/usc2701.htm


You can see my comment here: http://www.youtube.com/watch?v=QIlWwI0rmFs&feature=player_embedded
The moral of the story is don't be petty. It could make you a felon.


you complete cock-blocking insect piece of SHIT!....hehehe, you don't get laid much, huh??

Ex-girlfriend hits Starcraft fan where it hurts

NordlichReiter says...

Hmm, She went into his email?


§ 2701. Unlawful Access to Stored Communications

(a) Offense.--Except as provided in subsection (c) of this section whoever–

(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or

(2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.

(b) Punishment.--The punishment for an offense under subsection (a) of this section is–

(1) if the offense is committed for purposes of commercial advantage, malicious destruction or damage, or private commercial gain--
(A) a fine under this title or imprisonment for not more than one year, or both, in the case of a first offense under this subparagraph; and
(B) a fine under this title or imprisonment for not more than two years, or both, for any subsequent offense under this subparagraph; and
(2) a fine under this title or imprisonment for not more than six months, or both, in any other case.

(c) Exceptions.--Subsection (a) of this section does not apply with respect to conduct authorized–

(1) by the person or entity providing a wire or electronic communications service;

(2) by a user of that service with respect to a communication of or intended for that user; or

(3) in section 2703, 2704 or 2518 of this title.


She violated Federal Law, possibly much more.

§ 1343. Fraud by Wire, Radio, or Television
http://www.law.cornell.edu/uscode/18/1343.html

But more to the point, she intercepted communication which is the same as taking someones mail before they can read it.


18 U.S.C. § 2511(1)(a).

(1) Except as otherwise specifically provided in this chapter any person who—
(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication;


http://www.law.cornell.edu/uscode/18/1343.html

http://www.law.cornell.edu/uscode/18/usc_sec_18_00002511----000-.html

http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=2149

http://www.justice.gov/criminal/cybercrime/usc2701.htm



You can see my comment here: http://www.youtube.com/watch?v=QIlWwI0rmFs&feature=player_embedded

The moral of the story is don't be petty. It could make you a felon.

CIA Video Of Missionary Plane Shootdown

siftbot says...

Tags for this video have been changed from 'abc, cia, missionary, plane, surveillance, spy, intercept, peru, smuggler, mistake' to 'abc, cia, missionary, bowers, plane, surveillance, spy, intercept, peru, smuggler, mistake' - edited by calvados

On the Recent Move ... (Blog Entry by dag)

Krupo says...

I see 5 comments, I click on comments, but I just get bumped down to the blank comments box. Let's see if postinga comment changes this.

Edit: hard refresh fixed *that*.

arvana - I know someone whose URL keeps getting intercepted when clicked through from Google Reader. I wonder if what you described affected them? Hmm.

Flash and HTML 5 (Blog Entry by dag)

spoco2 says...

They may be nice demos... BUT, it's all about penetration (oooh er), and at the moment Flash rules the roost there. This fancy dancy video HTML5 stuff is working ONLY in Chrome and the latest Safari (having a chrome plugin to IE doesn't count)... so your market there is miniscule. So doing work for any company and saying that your market reach is about 1% at present vs 99% is not going to happen... until all major browsers support ALL portions of it and most people have upgraded... then we're at a point where doing any major site in it is a little problematic...

It takes a long time to move people to new browsers, not that long to fire up a prompt to update their flash player that they already have installed and leave their browser as is.

So, while it might be nice to dream of HTML5 replacing all plugins, and I hope it does... we have a ways to go.

OH

Except

Every browser will probably render things a little bit different so as a web coder (which I am, using OpenLaszlo which outputs to Flash and DHTML) it'll make my life HELL. I used to do work for a dot com company here in Australia, we moved to the states and were doing a project with AT&T... Our tech intercepted the html between the origin and the final browser and tried to insert a banner onto the top of each page. If all browsers actually conformed to the standards we'd have had no issue... but that's not the case by a looooong shot.

The thing I like about coding to Flash is that I get it right once, and then 'It Just Works' in every supported browser. Ahhhhhhh.

Until HTML5 becomes like that I'll curse it.

Pat Robertson - Haiti made a pact with the Devil

Trancecoach says...

Intercepted Correspondence Letter from Satan to Pat Robertson:


Dear Pat Robertson,

I know that you know that all press is good press, so I appreciate the shout-out. And you make God look like a big mean bully who kicks people when they are down, so I'm all over that action.

But when you say that Haiti has made a pact with me, it is totally humiliating. I may be evil incarnate, but I'm no welcher. The way you put it, making a deal with me leaves folks desperate and impoverished. Sure, in the afterlife, but when I strike bargains with people, they first get something here on earth -- glamour, beauty, talent, wealth, fame, glory, a golden fiddle.

Those Haitians have nothing, and I mean nothing. And that was before the earthquake. Haven't you seen "Crossroads"? Or "Damn Yankees"? If I had a thing going with Haiti, there'd be lots of banks, skyscrapers, SUVs, exclusive night clubs, Botox -- that kind of thing. An 80 percent poverty rate is so not my style.

Nothing against it -- I'm just saying: Not how I roll. You're doing great work, Pat, and I don't want to clip your wings -- just, come on, you're making me look bad. And not the good kind of bad. Keep blaming God. That's working. But leave me out of it, please. Or we may need to renegotiate your own contract.

Best, Satan

Lily Coyle, Minneapolis

Drew Brees Proves He's More Accurate than an Olympic Archer

thinker247 says...

I didn't care about the differences between a quarterback and an archer, or the fact that the editing could have been better. I loved the science of the ball hitting the target. I had no idea that a perfect spiral needed a precise amount of wobble. I understand now why a quarterback can miss a receiver and find himself with an interception.

First upvote of 2010.

Astronaut Catches Satellite In Orbit With No Tether

ForgedReality says...

>> ^dgandhi:
He is not just stepping off into space, he has an MMU on his back. Even if it malfunctioned, they could move the shuttle to intercept.
Remember, going up and down in a shuttle is much more dangerous than being in orbit on one, this is no where near as risky as getting up there in the first place.


Oh, yeah, sure, big words, PAL! I'd like to see YOU do that!

Astronaut Catches Satellite In Orbit With No Tether

dgandhi says...

He is not just stepping off into space, he has an MMU on his back. Even if it malfunctioned, they could move the shuttle to intercept.

Remember, going up and down in a shuttle is much more dangerous than being in orbit on one, this is no where near as risky as getting up there in the first place.

Deliciously bad: Skateboard death in Hawaii

oxdottir says...

And the name of the movie is Hard Ticket to Hawaii.A poster for the fine move

From IMDB: Two drug enforcement agents are killed on a private Hawaiian island. Donna and Taryn, two operatives for The Agency, accidentally intercept a delivery of diamonds intended for drug lord Seth Romero, who takes exception and tries to get them back. Soon other Agency operatives get involved, and a full-scale fight to the finish ensues, complicated here and there by an escaped snake made deadly by Toxic Waste!

The trailer

Not "Cool" Anymore - Yair Lapid (Worldaffairs Talk Post)

demon_ix says...

They don't have to create enthusiasm here. For a very long time before Cast Lead, the city of Sderot was taking 10+ rockets a day. The rockets (called Qassam) were basically a street light pole with some fuel and explosives. It's not a very powerful rocket, but it can't be targeted. That means that they can only pick a population center and launch. To the people living in Sderot, an alarm was sounding 10+ times a day that meant "Get to a bomb shelter within the next 20 seconds or you might die".

Israel is a tiny place. To get from the West Bank to one of our major cities (Haifa, Tel-Aviv, Jerusalem) will take about 1-3 hours, depending if the terrorist has someone picking him up, which they sometimes did. That's an extremely short time that the military has to react in, assuming they even know about it in advance.
So they go pro-active. They gather intelligence. They set up road blocks in obvious places where people can cross and build a wall where they can't monitor 24/7. It may seem offensive, but it's really about getting to it before there's nothing that can be done anymore.

The best example I can think of is the Karine A Intercept which also relates to why any army needs offensive units as well as defensive.
The purpose of an army is not to fight, it's not to destroy and it's not to decide it's own agenda. The army takes it's orders from non-military elected politicians and their entire purpose is to give those politicians options in any given situation.

------------------

Americans are always meddling in other governments, election processes and general public perception. Why can't you guys do that here? Start meddling! In the next election, make sure the left-wing peaceful candidate gets elected, and then things might start to change...

We do it all the time to you guys, according to about 20+ videos I've seen on the sift already

Charlie Sheen's Video Message to President Obama

philnthrope says...

I can see how with lots of bad luck and bad construction methods two planes could take down two buildings. I can, just because there are still two planes left. The Pentagon is thick and strong, a plane would leave little damage. Ok, let me buy that one too then. It still leaves one plane. The 4th one with bogus phone calls, no black box, and a small hole on the ground as debries. The 4th plane that crashed amidst some woods, and what did it leave behind? A hole smaller than a suburban-type pool. Before taking over the commands, passengers called family for eternal farewell such as: "Mother, this is Alfred Burmington, your son, I'm on a plane that is about to crash. Good-bye. My voice doesn't sound like your son because I'm very shaken with this outrageous situation."

This loose end makes the entire story fishy and it's not the conspiracy theorists fault, it's the terrible investigation that decided to leave questions unanswered instead of explaining to us how the construction company responsible for the construction of the twin towers in the 70's which now is a big company tied to big interests fucked up the whole thing by not following protocol to achieve bigger gains, etc. Typical case of construction company corruption. We'd all be happy if those yuppies were put to sleep or incarcerated in a homo-bears-yuppy-fetishists-filled prison. What about admitting the possibility of a spy planting bombs on the pentagon? Oh noes, that would shake the public opinion of the US military seriousness and leadership. Well it's already shaken by the fact that no planes were intercepted on that day. And yes we all heard about the excuses for that. Maybe they're true but still incomplete as any other explanation.
But that small hole on the ground the 4th plane left, that's the kind of bullshit nobody should get away with. And like a loose string it will make the entire bullshit crawl methodically

Pentagon Investigation Evidence Contradicts Official Story

bmacs27 says...

I think this site provides a good debunking of this video. What I like about it specifically is that it's from a known figure within the "truther" movement. What he's insinuating is that the "magic show" theorists such as CIT are likely paid to discredit any call for more information, and provide a distraction from more pressing questions about more plausible scenarios.

Specifically he asks:
* How was it possible that the Pentagon was hit 1 hour and 20 minutes after the attacks began?

* Why was there no response from Andrews Air Force Base, just over 10 miles away and home to Air National Guard units charged with defending the skies above the nation’s capital?

* Why did F-16s fail to protect Washington on 9/11? Was the Langley emergency response sabotaged?

* Why did Flight 77 hit a part of the building opposite from the high command and mostly empty and under renovation, with majority of victims being civilian accountants?

* Why were Pentagon workers not evacuated or warned that Flight 77 was approaching, despite those in the bunker tracking the attack plane as it closed the final 50 miles to the Pentagon?

* How could Flight 77 have been piloted through its extreme aerobatic final maneuvers by Hani Hanjour, a failed Cessna pilot who had never flown a jet?

* Why did the flight instructor who certified Hani Hanjour, a former Israeli paratrooper, disappear a few days after his 9/11 Commission interview?

* Why was a war game drill used to vacate the National Reconnaissance Office for the duration of the attack?

* How was a C-130 pilot able to intercept the plane incoming to the Pentagon while NORAD was not?

* Did the Pentagon, the nerve center of the US military, really have no missile or anti-aircraft defenses?

* What were Vice-president Cheney’s orders when Norman Mineta described him speaking to a young man in the presidential bunker as the plane approached, saying, “Of course the orders still stand, have you heard anything to the contrary?

For a conspiracy moderate like myself, these questions deserve addressing. Particularly questions about how a plane was allowed to reach the pentagon in the first place. Any politician claiming to be "tough on security" ought to be able to answer for how, on his watch, a commercial airliner piloted by an untrained pilot was able to strike the nerve center of the US military almost an hour after we had already been attacked.

If nothing more nefarious, Dick Cheney should have been indicted for gross negligence on that day.

Glenn Beck: Cars.gov Takes Over Your Computer Forever

Psychologic says...

Holy outrage batman! How can this be? It actually says that any files on your computer (or, as Beck says, anything in your home) are subject to interception and search?

Well, no. "Any or all uses of this system and all files on this system may be intercepted, monitored, etc, etc..." Another way of wording it would be "anything you access or submit inside of our system is our property and can be used by us however we want (under applicable privacy laws)". Your computer is considered a government computer while accessing the system.

It might suck if "average Americans" were being monitored in such a way, except that they don't have access to the system to begin with. As far as I can tell, this system is only available to people who have prior clearance (correct me if I'm wrong on that).

Whoever wrote the warning made a funny mistake in saying your computer is considered a "government computer system", leading to some very interesting interpretations of the "this system" phrase. It should be noted that the warning has been updated for clarity since then:

You are accessing a U.S. Government information system. This information system, including all related equipment, networks, and network devices, is provided for U.S. Government-authorized use only. Unauthorized or improper use of this system is prohibited, and may result in civil and criminal penalties, or administrative disciplinary action. The communications and data stored or transiting this system may be, for any lawful Government purpose, monitored, recorded, and subject to audit or investigation. By using this system, you understand and consent to such terms.



The funny part is that if this were done under the Bush administration then it would be the top story on Countdown and Fox wouldn't say one word about it.



Send this Article to a Friend



Separate multiple emails with a comma (,); limit 5 recipients






Your email has been sent successfully!

Manage this Video in Your Playlists

Beggar's Canyon